Profiles, Identities, Data: Making Abundant and Anchored Selves in a Platform Society

Total Page:16

File Type:pdf, Size:1020Kb

Profiles, Identities, Data: Making Abundant and Anchored Selves in a Platform Society This is a repository copy of Profiles, identities, data: making abundant and anchored selves in a platform society. White Rose Research Online URL for this paper: http://eprints.whiterose.ac.uk/139678/ Version: Accepted Version Article: Szulc, L. (2019) Profiles, identities, data: making abundant and anchored selves in a platform society. Communication Theory, 29 (3). pp. 257-276. ISSN 1050-3293 https://doi.org/10.1093/ct/qty031 This is a pre-copyedited, author-produced version of an article accepted for publication in Communication Theory following peer review. The version of record, Lukasz Szulc; Profiles, Identities, Data: Making Abundant and Anchored Selves in a Platform Society, Communication Theory is available online at: https://doi.org/10.1093/ct/qty031 Reuse Items deposited in White Rose Research Online are protected by copyright, with all rights reserved unless indicated otherwise. They may be downloaded and/or printed for private study, or other acts as permitted by national copyright laws. The publisher or other rights holders may allow further reproduction and re-use of the full text version. This is indicated by the licence information on the White Rose Research Online record for the item. Takedown If you consider content in White Rose Research Online to be in breach of UK law, please notify us by emailing [email protected] including the URL of the record and the reason for the withdrawal request. [email protected] https://eprints.whiterose.ac.uk/ Szulc - Profiles, Identities, Data 1 Lukasz Szulc Lecturer in Digital Media and Society Department of Sociological Studies University of Sheffield [email protected] Profiles, Identities, Data: Making Abundant and Anchored Selves in a Platform Society Abstract The practice of profile making has become ubiquitous in digital culture. Internet users are regularly invited, usually required, to create a profile for a plethora of digital media, including mega social media platforms such as Facebook and Twitter. Understanding profiles as a set of identity performances, I argue that the platforms employ profiles to enable and incentivize particular ways and foreclose other ways of self-performance. Drawing on research into digital media and identities, combined with mediatization theories, I show how the platforms (1) embrace datafication logic (gathering as much data as possible and pinpointing the data to a particular unit), (2) translate the logic into design and governance of profiles (update stream and profile core), and (3) coax—at times coerce—their users into making of abundant but anchored selves, that is, performing identities which are capacious, complex, and volatile but singular and coherent at the same time. Keywords identity, profiles, social media, platforms, mediatization, data Szulc - Profiles, Identities, Data 2 Author’s biographical note Lukasz Szulc is a Lecturer in Digital Media and Society in the Department of Sociological Studies at the University of Sheffield as well as a Marie Curie Individual Fellow in the Department of Media and Communications at the London School of Economics and Political Science. He is also co-chairing LGBTQ Interest Group in International Communication Association. His interests include cultural and critical studies of media, sexuality, nationalism, and transnationalism. He recently published the book ‘Transnational Homosexuals in Communist Poland: Cross-Border Flows in Gay and Lesbian Magazines’ (2018, Palgrave) and co-edited the collection ‘LGBTQs, Media and Culture in Europe’ (2017, Routledge). Acknowledgements I want to thank Myria Georgiou (LSE), Nick Couldry (LSE), and Jdrzej Niklas (LSE) for their comments on the first draft of this article. I am also grateful for the feedback I received from the editor and reviewers of Communication Theory as well as from the participants of LSE Research Dialogues, KCL Digital Self workshop, ECREA Digital Culture and Communication Section conference in Brighton in 2017, MeCCSA conference in London in 2018, and ICA conference in Prague in 2018. This research was conducted during my postdoctoral research stay in the LSE Department of Media and Communications and funded by the European Commission’s Marie Skłodowska-Curie Actions, grant number: 699745 - FACELOOK - MSCA-IF-EF-ST. Szulc - Profiles, Identities, Data 3 Introduction The practice of profile making has become ubiquitous in digital culture. Internet users are regularly invited, usually required, to create a profile for a plethora of digital services, including online banking, gaming sites, dating apps, as well as Social Networking Services (SNSs) such as Facebook, Twitter, Google+, Instagram, Pinterest, Tumblr, and many, many others. Constructing a profile is not unique to digital culture: it can be traced back to such acts as filling in an application form, participating in a research survey, or summarizing one’s career in CV. But it is only in digital culture that this practice has reached such an unprecedented scale. And the role of SNSs is crucial in this respect for a number of reasons. First, the most successful SNSs have gained an immense popularity: Facebook announced in mid-2017 that it had neared two billion monthly users (BBC, 2017). Second, the most successful SNSs have started to colonize the web by becoming infrastructures, or platforms, for other types of digital media (e.g., Helmond, 2015; van Dijck, 2016). Third, SNSs are becoming increasingly embedded in everyday life, especially through the popularization of smartphones. And profiles—as popular definitions of SNSs attest (e.g., boyd & Ellison, 2008, p. 211; Ellison & boyd, 2013, p. 158)— are the essential component of SNSs: making a profile is not only most often a prerequisite of SNS use but also structures the use: We search for profiles, connect to profiles, and interact with profiles. This proliferation of the practice of profile making through increasingly popular, powerful, and pervasive SNSs is closely related to the performance and construction of identities.1 As boyd (2011) explains, profile making is “an explicit act of writing oneself into being in a digital environment” (p. 43). Acknowledging that online and offline experiences are mutually constitutive, I draw on Cover (2016) who understands profiles as “a series of performative acts which constitute the self” (p. 14). In this conceptualization of profiles, Cover builds on Butler’s (1990, 1993) theory of identity as performative, according to which identity is constructed in Szulc - Profiles, Identities, Data 4 the process of repetitive acts of self-performance. Like a theater play, identity is constrained by a pre-existing script (power of structure), which nonetheless can be enacted differently every time it is performed (potential for agency). At the same time, particular reiterative performances of particular aspects of identity (e.g., performances of gender as masculine males and feminine females), stabilize these categories and, retroactively, create the illusion of their coherence (Butler, 1990, p. 143). Profiles are therefore understood here as a set of identity performances which, along with other online and offline identity performances, contribute to the constitution of the self (Cover, 2016, p. 14). Specific affordances of profiles, however, limit the form in which identities can be performed on SNSs. Like any other “technologies of the self” (Foucault, 1988), profiles are “being developed, implemented, and effective as integral to the complex ideological, political, economic, and environmental arrangements that constitute social and cultural life” (Slack, 2017, p. 193). The very requirement to interact through profiles, specific SNS architectures, as well as distinct profile design and governance, reflect both conscious decisions and unconscious biases built into this particular technology of the self. Consequently, SNSs enable and incentivize particular ways and foreclose other ways of self-performance. Questions about the structure and origin, as well as potential effects of the ubiquitous practice of profile making for the performance and construction of identities lie at the heart of this article: What are the forms of self-performance afforded by SNSs? What kind of expectations are built into design and governance of profiles? What are the motivations behind them? And, most ambitiously: What potential consequences may they have for identity performance and construction? While the growing number of works offers detailed discussions of specific profile categories (e.g., gender, race, and ethnicity) on specific SNSs (e.g., Bivens, 2017; Bivens & Haimson, 2016; Byrne, 2007; Shield, 2017), there is still a scarcity of comparisons between different SNSs (Zhang & Leung, 2015), which could point to some broader tendencies across SNSs. Szulc - Profiles, Identities, Data 5 Therefore, in this article my aim is to build on the previous works on digital media and identities to discuss the rise of the practice of profile making more generally, to propose a theoretical move towards a more overarching examination of entire “profile culture” (Donnelly, 2011). To this end, I will marry a vast body of research on digital media and identities to the theories of mediatization, which are concerned with long-term and far-reaching changes of media and society (as I will explain in more detail further in this article), and thus become useful to zoom out to some more fundamental issues of profile culture in relation to identity. In my discussion, I will focus on the so-called “affluent
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • The Constitutionality of Banning Sex Offenders from Social Networking Sites
    WYNTON IN PRINTER PROOF.DOC 4/14/2011 8:08:24 PM Note MYSPACE, YOURSPACE, BUT NOT THEIRSPACE: THE CONSTITUTIONALITY OF BANNING SEX OFFENDERS FROM SOCIAL NETWORKING SITES JASMINE S. WYNTON† ABSTRACT In recent years there has been intense public pressure to enact increasingly restrictive and intrusive sex offender laws. The regulation of sex offenders has now moved online, where a growing amount of protected expression and activity occurs. The latest trend in sex offender policy has been the passage of state laws prohibiting sex offenders from visiting social networking sites, such as Myspace or Facebook. The use of these websites implicates the First Amendment right of expressive association. Broad social-networking-site bans threaten the First Amendment expressive association rights of sex offenders, who do not lose all of their constitutional rights by virtue of their conviction. Although social-networking-site bans are politically attractive on the surface, such prohibitions are fundamentally flawed because they are predicated on a number of widespread misconceptions about sex offenses and sex offender behavior. These misconceptions include the beliefs that all registered sex offenders are violent sexual predators who have extremely high recidivism rates and that Internet predators are increasing the incidence of sex crimes against minors. In fact, there is very little evidence to indicate that this type of legislation will help reduce sexual violence. This Note argues Copyright © 2011 by Jasmine S. Wynton. † Duke University School of Law, J.D. expected 2011; Spelman College, B.A. 2008. First, I would like to thank God for the ability, strength, and perseverance to write this Note, and I would like to thank my family for their constant love, support, and encouragement.
    [Show full text]
  • Attention to Rivalry Among Online Platforms and Its Implications for Antitrust Analysis David S
    University of Chicago Law School Chicago Unbound Coase-Sandor Working Paper Series in Law and Coase-Sandor Institute for Law and Economics Economics 2013 Attention to Rivalry among Online Platforms and Its Implications for Antitrust Analysis David S. Evans Follow this and additional works at: https://chicagounbound.uchicago.edu/law_and_economics Part of the Law Commons Recommended Citation David S. Evans, "Attention to Rivalry among Online Platforms and Its Implications for Antitrust Analysis" (Coase-Sandor Institute for Law & Economics Working Paper No. 627, 2013). This Working Paper is brought to you for free and open access by the Coase-Sandor Institute for Law and Economics at Chicago Unbound. It has been accepted for inclusion in Coase-Sandor Working Paper Series in Law and Economics by an authorized administrator of Chicago Unbound. For more information, please contact [email protected]. ATTENTION RIVALRY AMONG ONLINE PLATFORMS AND ITS IMPLICATIONS FOR ANTITRUST ANALYSIS David S. Evans* 2 January 2013 Email: [email protected] Abstract Many online businesses, including most of the largest platforms, seek and provide attention. These online attention rivals provide products and features to obtain the attention of consumers and sell some of that attention, through other products and services, to merchants, developers and others who value it. The multi-sided business of seeking and providing attention is fluid with rivalries crossing boundaries defined by the features of the products and services. It is also dynamic. Rivals introduce new products and services, some involving drastic innovation, frequently. Online attention rivals impose competitive constraints on each other. Product differentiation tempers the significance of these constraints in particular situations.
    [Show full text]
  • Web 2.0: Where Does Europe Stand?
    Web 2.0: Where does Europe stand? Author: Sven Lindmark EUR 23969 EN - 2009 The mission of the JRC-IPTS is to provide customer-driven support to the EU policy- making process by developing science-based responses to policy challenges that have both a socio-economic as well as a scientific/technological dimension. European Commission Joint Research Centre Institute for Prospective Technological Studies Contact information Address: Edificio Expo. c/ Inca Garcilaso, 3. E-41092 Seville (Spain) E-mail: [email protected] Tel.: +34 954488318 Fax: +34 954488300 http://ipts.jrc.ec.europa.eu http://www.jrc.ec.europa.eu Legal Notice Neither the European Commission nor any person acting on behalf of the Commission is responsible for the use which might be made of this publication. Europe Direct is a service to help you find answers to your questions about the European Union Freephone number (*): 00 800 6 7 8 9 10 11 (*) Certain mobile telephone operators do not allow access to 00 800 numbers or these calls may be billed. A great deal of additional information on the European Union is available on the Internet. It can be accessed through the Europa server http://europa.eu/ JRC 53035 EUR 23969 EN ISBN 978-92-79-13182-0 ISSN 1018-5593 DOI 10.2791/16327 Luxembourg: Office for Official Publications of the European Communities © European Communities, 2009 Reproduction is authorised provided the source is acknowledged Printed in Spain PREFACE Information and Communication Technology (ICT) markets are exposed to a more rapid cycle of innovation and obsolescence than most other industries.
    [Show full text]
  • The Antitrust Case Against Facebook: a Monopolist's Journey Towards Pervasive Surveillance in Spite of Consumers' Preference for Privacy Dina Srinivasan
    Berkeley Business Law Journal Volume 16 | Issue 1 Article 2 2019 The Antitrust Case Against Facebook: A Monopolist's Journey Towards Pervasive Surveillance in Spite of Consumers' Preference for Privacy Dina Srinivasan Follow this and additional works at: https://scholarship.law.berkeley.edu/bblj Part of the Law Commons Recommended Citation Dina Srinivasan, The Antitrust Case Against Facebook: A Monopolist's Journey Towards Pervasive Surveillance in Spite of Consumers' Preference for Privacy, 16 Berkeley Bus. L.J. 39 (2019). Link to publisher version (DOI) This Article is brought to you for free and open access by the Law Journals and Related Materials at Berkeley Law Scholarship Repository. It has been accepted for inclusion in Berkeley Business Law Journal by an authorized administrator of Berkeley Law Scholarship Repository. For more information, please contact [email protected]. SRINIVASAN.FINAL CHECK (DO NOT DELETE) 2/20/2019 1:43 PM THE ANTITRUST CASE AGAINST FACEBOOK: A MONOPOLIST’S JOURNEY TOWARDS PERVASIVE SURVEILLANCE IN SPITE OF CONSUMERS’ PREFERENCE FOR PRIVACY Dina Srinivasan* ABSTRACT ...................................................................................................... 40 INTRODUCTION ............................................................................................. 40 I. PRIVACY WAS ONCE A CRUCIAL FORM OF COMPETITION ............ 46 II. THE PARADOX OF SURVEILLANCE REFLECTS MONOPOLY POWER .................................................................................................. 54 A.
    [Show full text]
  • Social Network Sites: Definition, History, and Scholarship
    Social Network Sites: Definition, History, and Scholarship danah m. boyd [email protected] School of Information University of California-Berkeley Nicole B. Ellison [email protected] Department of Telecommunication, Information Studies, and Media Michigan State University Abstract Introduction Social Network Sites: A Definition A History of Social Network Sites Previous Scholarship Overview of this Special Theme Section Future Research Acknowledgments Notes References About the Authors Abstract Social network sites (SNSs) are increasingly attracting the attention of academic and industry researchers intrigued by their affordances and reach. This special theme section of the Journal of Computer-Mediated Communication brings together scholarship on these emergent phenomena. In this introductory article, we describe features of SNSs and propose a comprehensive definition. We then present one perspective on the history of such sites, discussing key changes and developments. After briefly summarizing existing scholarship concerning SNSs, we discuss the articles in this special section and conclude with considerations for future research. Introduction Since their introduction, social network sites (SNSs) such as MySpace, Facebook, Cyworld, and Bebo have attracted millions of users, many of whom have integrated these sites into their daily practices. As of this writing, there are hundreds of SNSs, with various technological affordances, supporting a wide range of interests and practices. While their key technological features are fairly consistent, the cultures that emerge around SNSs are varied. Most sites support the maintenance of pre-existing social networks, but others help strangers connect based on shared interests, political views, or activities. Some sites cater to diverse audiences, while others attract people based on common language or shared racial, sexual, religious, or nationality-based identities.
    [Show full text]
  • WHAT YOU NEED to KNOW ABOUT Social Networking
    TOOLS OF THE TRADE WHAT YOU NEED TO KNOW ABOUT Social Networking BY MEAGAN DORSCH AND PAM GREENBERG logging. Tweeting. Facebooking. If you think these are terms only teenag- ers are familiar with, think again. The use of social media sites, or tools Bof Web 2.0, spans generations. The first social networking site, SixDegrees.com, was created in 1997, followed by sites such as BlackPlanet, Friendster and MySpace. But today, the most popular site is Facebook, with more than 200 million members worldwide. In the United States, the number of adults with a profile on a social networking site has more than quadrupled in the past four years—from 8 percent in 2005 to 35 percent in December 2008—according to Pew Inter- net and American Life Project surveys. Time spent on social networking and blogging sites is growing at more than three times the rate of overall global Internet growth. And the fastest growing segment of users is women over age 55. Candidates for school boards, city coun- cils, state legislatures and even the president of the United States have used social net- working tools. More than 35 state legislative caucuses across the country are using social network- ing sites such as Facebook, MySpace and Twitter. These new interactive communities allow politicians to have direct, unfiltered communication with voters and constituents. campaign tool that can influence debate, help Legislators are also using social media as a build name recognition, gain supporters and 1 motivate volunteers around elections. KNOW THE TOOLS Are social media for you? Below are eight The number and types of tools in the social Meagan Dorsch is NCSL’s Media Manager, and Pam things you should know before setting up media arsenal are expanding each day.
    [Show full text]
  • Peer-To-Peer Protocol and Application Detection Support
    Peer-to-Peer Protocol and Application Detection Support This appendix lists all the protocols and applications currently supported by Cisco ASR 5500 ADC. • Supported Protocols and Applications, on page 1 Supported Protocols and Applications This section lists all the supported P2P protocols, sub-protocols, and the applications using these protocols. Important Please note that various client versions are supported for the protocols. The client versions listed in the table below are the latest supported version(s). Important Please note that the release version in the Supported from Release column has changed for protocols/applications that are new since the ADC plugin release in August 2015. This will now be the ADC Plugin Build number in the x.xxx.xxx format. The previous releases were versioned as 1.1 (ADC plugin release for December 2012 ), 1.2 (ADC plugin release for April 2013), and so on for consecutive releases. New in this Release This section lists the supported P2P protocols, sub-protocols and applications introduced in the ADC Plugin release for November 28, 2019. None in this release. All Supported Protocols and Applications This section lists all the supported P2P protocols, sub-protocols and applications supported until ADC Plugin release on October 31, 2019. Peer-to-Peer Protocol and Application Detection Support 1 Peer-to-Peer Protocol and Application Detection Support All Supported Protocols and Applications Protocol / Client Client Version Group Classification Supported from Application Release 120Sports 120Sports 1.6
    [Show full text]
  • Procedures Tor Setting U|3^ Content Scan (UNCLASSIFIED)
    From: Sent: Tuesday, February 27, 2007 11:35 AM To: Subject: FW: Procedures tor setting U|3^ Content Scan (UNCLASSIFIED) Attachments: SE RICO.xls; Watchfire WebXM SCAN Manual.doc 3E RICO.xls (58 KB Watchfire WebXM SCAN Manual.do... Classification: UNCLASSIFIED Caveats: NONE -Original Message Sent: Thursday, February )]ect: Procedures tor setting up a Content Scan (UNCLASSIFIED) Classification: UNCLASSIFIED Caveats: NONE Attached is a spreadsheet and word document The doc is a step-by-step procedure on setting up a Content Scan. The spreadsheet is divided into 4 sections with YOUR appropriate name on the top of 20 URLS . The step-by-step document is in draft form. Please make note of any thing that needs to be change of addressed. Notice that the RCIO is SE, so create the job in the SE RCIO. Once you have completed and the jobs have finished. Let me now have many potential violations were found for each job. If someone has a few violations and someone has a substantial amount, we can assign jobs accordingly Thanks SFC paschal Classification: UNCLASSIFIED Caveats: NONE Classification: UNCLASSIFIED Caveats: NONE A- mi\.\ , • } •t .«* ;* 2 US AG School SE US AG School SE APBI2002 SE APBI 2002 SE CHL SE CHL SE CIRP SE CIRP SE CPOCSCR SE CPOCSCR SE EBS SE EBS SE cesas SE cesas SE 184th IMAD SE 184th IMAD SE JTS SE JTS SE NGATS SE NGATS SE PMTMDE SE PM TMDE SE RFI SE RFI SE SPORT Website SE SPORT Website SE LA-TLAC SE LA-TLAC SE USASAM SE USASAM SE USASSI SE USASSI SE USAWOCC SE USAWOCC SE VTC SE VTC SE AMRDEC AEROMECH SE AMRDEC AEROMECH SE
    [Show full text]
  • Use of Social Media in School Behavioral Threat Assessments Housekeeping
    Use of Social Media in School Behavioral Threat Assessments Housekeeping • To download a copy of the presentation slides and other pertinent handouts, use the Handouts on your screen. Select the name of the handout(s) you want and click the “Download File(s)” button. • There is no dial-in for this webinar. Audio is available via the link provided. If you are experiencing difficulty hearing the audio stream, make sure your computer speaker volume is turned up. • If you experience technical difficulties during the webinar, please contact the REMS TA Center at [email protected] or 1-855-781-REMS [7367]. You may also request technical assistance using the Q&A Tool. These questions are viewable to the webinar moderator only. Questions & Answers Please pose any questions using the Q&A Tool on the lower right side of your computer screen. Agenda 1. Threat Assessments in Schools 2. Social Media and Threat Assessments 3. Integrating Social Media into Threat Assessment Planning 4. Q&A Session Purpose of Threat Assessment The primary purpose of a threat assessment is to prevent targeted violence in schools by students Threat Assessment Definition A fact-based investigative and analytical approach that: • focuses on what a particular student is doing and saying, and; • not on whether the student "looks like" those who have attacked schools in the past. Threat assessment emphasizes the importance of such behavior and communications for identifying, evaluating and reducing the risk posed by a student who may be thinking about or planning for a school-based attack. The Final Report and Findings of the Safe School Initiative U.S.
    [Show full text]
  • Memoria Final
    Graduated in Computer Engineering Universidad Politécnica de Madrid Escuela Técnica Superior de Ingenieros Informáticos FINAL DEGREE PROJECT Study of privacy in social network plug-ins Author: Miguel Pozo Ruiz Directors: Alessandra Gorla (IMDEA Software) and Ángel Rodríguez (ETSIINF) Collaborator: Carmela Troncoso (IMDEA Software) MADRID, JANUARY 2017 INDEX RESUMEN DEL TRABAJO REALIZADO ............................................................................................. I SUMMARY OF THE WORK ............................................................................................................. II 1. INTRODUCTION ......................................................................................................................... 1 1.1 Aims and goals..................................................................................................................... 1 1.2 Chapters summary .............................................................................................................. 2 2. STATE OF THE ART ..................................................................................................................... 3 2.1 Social networks ................................................................................................................... 3 2.2 Clickjacking ........................................................................................................................ 22 2.3 Web crawling ....................................................................................................................
    [Show full text]
  • ADC Administration Guide, Staros Release 21.10
    ADC Administration Guide, StarOS Release 21.10 First Published: 2018-11-02 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]